CVE-2016-9800

Priority
Description
In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump"
function in "tools/parser/hci.c" source file. The issue exists because
"pin" array is overflowed by supplied parameter due to lack of boundary
checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
Notes
 mdeslaur> as of 2019-01-11, appears unfixed
Package
Source: bluez (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was deferred [2017-08-01])
Ubuntu 14.04 LTS (Trusty Tahr):deferred (2019-01-11)
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2019-01-11)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2019-01-11)
Ubuntu 18.10 (Cosmic Cuttlefish):deferred (2019-01-11)
Ubuntu 19.04 (Disco Dingo):deferred (2019-01-11)
More Information

Updated: 2019-01-14 21:22:00 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)